Fortinet has issued an urgent security advisory for a critical, actively exploited zero-day vulnerability in its FortiClient Endpoint Management Server (EMS). The vulnerability, tracked as CVE-2026-35616, has a CVSS score of 9.1 (Critical) and allows an unauthenticated, remote attacker to bypass API authentication and execute arbitrary code. Due to confirmed in-the-wild exploitation, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-35616 to its Known Exploited Vulnerabilities (KEV) catalog, requiring immediate patching by federal agencies. All organizations using the affected FortiClient EMS versions are urged to apply the provided hotfixes without delay to prevent system compromise.
The vulnerability impacts the following versions of FortiClient EMS:
Note: The 7.2 branch of FortiClient EMS is reportedly not affected by this vulnerability.
Fortinet has confirmed that it has observed active exploitation of CVE-2026-35616 in the wild. Following this confirmation, CISA added the vulnerability to its KEV catalog on April 6, 2026, with a remediation deadline of April 9, 2026, for Federal Civilian Executive Branch (FCEB) agencies. The Cyber Security Agency of Singapore (CSA) has also issued a corresponding alert, indicating a global threat.
A successful exploit of CVE-2026-35616 has severe consequences. The FortiClient EMS is a central management server for an organization's endpoints. Compromising the EMS server could allow an attacker to:
This represents a catastrophic failure of the endpoint security management infrastructure.
Security teams should hunt for signs of exploitation attempts in their logs:
powershell.exe, cmd.exe, or wscript.exe.D3-NTA): Analyze traffic to the EMS server to identify anomalous request patterns or connections from known malicious IPs.D3-PA): Monitor the EMS server for suspicious child processes or command-line executions indicative of post-exploitation activity.Immediate patching is the only effective remediation.
D3-SU): This is the primary and most critical countermeasure. Applying the security update from Fortinet directly remediates the vulnerability.CVSS score updated to 9.8, nearly 2,000 FortiClient EMS instances exposed online, and new IOCs released as exploitation attempts increase.
CISA sets strict April 9 deadline for Fortinet EMS patch; vulnerability discovered by Defused.
The most critical mitigation is to apply the security patches provided by Fortinet immediately.
As a temporary compensating control, restrict network access to the FortiClient EMS management interface to only authorized administrative IP addresses.
The primary and most effective countermeasure against CVE-2026-35616 is to apply the emergency hotfix provided by Fortinet. Given the active exploitation in the wild, this should be treated as an emergency change. Prioritize patching all internet-facing FortiClient EMS instances within hours, not days. For internal instances, patching should follow immediately after. Organizations should activate their incident response and patch management teams to verify the current version of all EMS servers, download the correct hotfix from Fortinet's official support site, and deploy it across the environment. After deployment, it is crucial to verify that the patch has been successfully applied and the service has restarted correctly. This action directly closes the vulnerability, preventing attackers from exploiting it for initial access or privilege escalation.
As a critical compensating control, especially if patching is delayed, organizations must implement strict inbound traffic filtering for their FortiClient EMS servers. The management interface of the EMS should never be exposed to the public internet. Configure firewall rules or cloud security groups to restrict all access to the EMS management ports (e.g., TCP/443, TCP/8013) to a small, well-defined set of internal administrative IP addresses or a dedicated management VPN. This action dramatically reduces the attack surface by preventing external, unauthenticated attackers from reaching the vulnerable API endpoint. While this does not fix the underlying vulnerability, it blocks the known attack vector for external threats and provides a crucial layer of defense while the patching process is underway.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats